General
-
Target
247787e012d0f75494cedc772fcfc4b2fbcf6fa472407813fecbc92ff10b4fb3
-
Size
666KB
-
Sample
241105-vvzqwswbpp
-
MD5
1913c154befe8f94c34ebac147987b13
-
SHA1
4761eaffad0611173fc6ddce8b0b8f20e2b14579
-
SHA256
247787e012d0f75494cedc772fcfc4b2fbcf6fa472407813fecbc92ff10b4fb3
-
SHA512
cb125c382144f8e9dad3c22adf88dd9ab2466934ccf05b02cc87ce753ebbe4aee95ec337c7cb8a83851fee2972a9dd288c873673035d1ae1df6267b74f04a3b8
-
SSDEEP
12288:IMrPy90yUIa5CiDGRN7D67groUNPp5t8Akf3ix4KrUd4I/w7VMeCEo9IcLNG/u:nyKI4DUN7+gLHU6rHmw5Mqo9jUm
Static task
static1
Behavioral task
behavioral1
Sample
247787e012d0f75494cedc772fcfc4b2fbcf6fa472407813fecbc92ff10b4fb3.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Targets
-
-
Target
247787e012d0f75494cedc772fcfc4b2fbcf6fa472407813fecbc92ff10b4fb3
-
Size
666KB
-
MD5
1913c154befe8f94c34ebac147987b13
-
SHA1
4761eaffad0611173fc6ddce8b0b8f20e2b14579
-
SHA256
247787e012d0f75494cedc772fcfc4b2fbcf6fa472407813fecbc92ff10b4fb3
-
SHA512
cb125c382144f8e9dad3c22adf88dd9ab2466934ccf05b02cc87ce753ebbe4aee95ec337c7cb8a83851fee2972a9dd288c873673035d1ae1df6267b74f04a3b8
-
SSDEEP
12288:IMrPy90yUIa5CiDGRN7D67groUNPp5t8Akf3ix4KrUd4I/w7VMeCEo9IcLNG/u:nyKI4DUN7+gLHU6rHmw5Mqo9jUm
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1